InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Telephone Network Resource Identification Using Wildcarding

IP.com Disclosure Number: IPCOM000122824D
Original Publication Date: 1998-Jan-01
Included in the Prior Art Database: 2005-Apr-04
Document File: 4 page(s) / 113K

Publishing Venue


Related People

Avargues, D: AUTHOR [+3]


Disclosed is a program which computes a list of resource identifiers used to configure a backbone telephone network, using wildcards from a specified range of values.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Telephone Network Resource Identification Using Wildcarding

      Disclosed is a program which computes a list of resource
identifiers used to configure a backbone telephone network, using
wildcards from a specified range of values.

      Resource identifiers are E.164 or Private Numbering Plan (PNP)
telephone numbers.  From the lowest and the highest value of a given
range, the program derives the shortest list of resource id's making
use of wildcards whenever possible to represent subranges within the
given range (e.g., the range of PNP numbers 324000-325999 leads to
the resource id's 324+ and 325+ that represent the two subranges
324000-324999 and 325000-325999 that make up the whole range).

      This program, therefore, allows easy network configuration and
optimizes network resource identification in computing a minimum

      Access switches of a backbone network that attach to external
PBXes (or ISDN) need to interpret the Called Party (telephone) Number
(CdPN) of the PBX that originates a call set-up message in order to
route the call to the proper remote PBX.  An access agent program in
the origin access switch is responsible for locating the destination
access switch that will transfer the call to the remote PBX.

      Locating the destination access switch consists in finding the
one that has been configured with the list of resource identifiers
that contains the requested telephone number (i.e., the CdPN).
Access switches must therefore be configured with all the possible
telephone numbers that the attached PBX or ISDN can reach.  The list
of all possible telephone numbers is generally large and cannot be
configured in filling in all possible numbers.  The disclosed program
derives the list of telephone resource id's, minimizing its size in
taking advantage of wildcards, from the lowest and highest values of
a range of resource id's to be configured, allowing the user to
configure the network in specifying only the two bound values, thus
preventing configuration errors.

      Fig. 1 shows the backbone telephone network and different PBXes
attached to the access switches (AS) at its periphery.
  1.  The destination access switch on the right hand side has
       been configured such that the private telephone numbers
       ranging from 324000 to 325999 can be called.  The
       configuration only had to specify the bound values 324000
       and 325999.  The disclosed program in this example derived
       the following resource id's: 324+ and 325+.  Thanks to
       wildcards, only two values are stored that represent two
       thousand different numbers.
  2.  The telephone on the left hand side initiates a call and
       wants to reach the number 324123, for example.
  3.  The origin access switch receives the call set-up messag...